Navigate
IR-5
IR-5: Incident Monitoring
The organization tracks and documents information system security incidents.
Supplemental
Documenting information system security incidents includes, for example, maintaining records about each incident, the status of the incident, and other pertinent information necessary for forensics, evaluating incident details, trends, and handling. Incident information can be obtained from a variety of sources including, for example, incident reports, incident response teams, audit monitoring, network monitoring, physical access monitoring, and user/administrator reports.
CIA Levels | |
---|---|
Confidentiality | low |
Integrity | low |
Availability | low |
Overlays |
---|
Privacy (High), Privacy (Low), Privacy (Mod), Privacy (PHI) |
Related Controls
The controls below (if any) were marked by NIST as being related to IR-5.
Enhancements
The controls below (if any) add on to the requirements of IR-5.
Control | Description |
---|---|
IR-5 (1) | The organization employs automated mechanisms to assist in the tracking of security incidents and in the collection and analysis of incident information. |
Related CCIs
The CCIs below are tied to IR-5.